Today’s signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus and en...
Charles R. Haag, Gary B. Lamont, Paul D. Williams,...
With the rise of XML as a standard model of data exchange, XML functional dependencies (XFDs) have become important to areas such as key analysis, document normalization, and data ...
In searching a repository of business documents, a task of interest is that of using a query signature image to retrieve from a database, other signatures matching the query. The ...
Sargur N. Srihari, Shravya Shetty, Siyuan Chen, Ha...
We introduce a novel framework for automatic 3D facial expression analysis in videos. The preliminary results were demonstrated by editing the facial expression with facial recogni...
Ya Chang, Marcelo Bernardes Vieira, Matthew Turk, ...
Linkage disequilibrium mapping is a process of inferring the disease gene location from observed associations of marker alleles in affected patients and normal controls. In reality...